Handbook of Applied Cryptography
ADD. KEYWORDS: Book, Overview of Cryptography, Mathematics
Background, Number-Theoretic Reference, Public-Key Parameters, Pseudorandom
Bits and Sequences, Stream Ciphers, Block Ciphers, Public-Key Encryption,
Hash Functions and Data Integrity, Identification and Entity Authentication,
Digital Signatures, Key Establishment Protocols, Key Management Techniques,
Efficient Implementation
SOURCE: Alfred J. Menezes, Paul C. van Oorschot and Scott
A. Vanstone, University of Waterloo
TECHNOLOGY: Postscript and Adobe Acrobat readers